Sciweavers

1296 search results - page 71 / 260
» Multiplicative Background Risk
Sort
View
TCSV
2008
110views more  TCSV 2008»
15 years 14 days ago
Fuzzy-Logic Congestion Control of Transcoded Video Streaming Without Packet Loss Feedback
Congestion control of a variable bit-rate video stream crossing the Internet is crucial to ensuring the quality of the received video. When a fuzzy-logic congestion controller (FL...
Emmanuel Jammeh, Martin Fleury, Mohammed Ghanbari
137
Voted
ICIP
2010
IEEE
14 years 10 months ago
3D vertebrae segmentation using graph cuts with shape prior constraints
Osteoporosis is a bone disease characterized by a reduction in bone mass, resulting in an increased risk of fractures. To diagnose the osteoporosis accurately, bone mineral densit...
Melih S. Aslan, Asem M. Ali, Dongqing Chen, Ben Ar...
109
Voted
ITIIS
2010
130views more  ITIIS 2010»
14 years 7 months ago
A Novel System for Detecting Adult Images on the Internet
As Internet usage has increased, the risk of adolescents being exposed to adult content and harmful information on the Internet has also risen. To help prevent adolescents accessi...
Jae-Yong Park, Sang-Sung Park, Young-Geun Shin, Do...
83
Voted
CDC
2008
IEEE
110views Control Systems» more  CDC 2008»
15 years 7 months ago
Multistage investments with recourse: A single-asset case with transaction costs
— We consider a financial decision problem involving dynamic investment decisions on a single risky instrument over multiple and discrete time periods. Investment returns are as...
Ufuk Topcu, Giuseppe Carlo Calafiore, Laurent El G...
106
Voted
HICSS
2008
IEEE
181views Biometrics» more  HICSS 2008»
15 years 7 months ago
Systems Theory Model for Information Security
Architecting security solutions for today’s diverse computer systems is a challenge. The modern business environment is comprised of many different applications, e-mail, databas...
Wm. Arthur Conklin, Glenn B. Dietrich